nerdexam
CompTIACompTIA

PT0-002 · Question #567

PT0-002 Question #567: Real Exam Question with Answer & Explanation

The correct answer is A: MAC spoofing. To bypass a Network Access Control (NAC) mechanism that uses MAC address filtering, the most effective technique is MAC spoofing. This involves changing the MAC address of the attacker's device to match an allowed MAC address on the network. By doing so, the penetration tester ca

Attacks and Exploits

Question

A penetration tester wants to bypass a NAC mechanism that restricts access to a network circumvent the MAC and gain unauthorized access to the network. Which of the following techniques should the tester use?

Options

  • AMAC spoofing
  • BVLAN hopping
  • CBrute-force attack
  • DDNS cache poisoning

Explanation

To bypass a Network Access Control (NAC) mechanism that uses MAC address filtering, the most effective technique is MAC spoofing. This involves changing the MAC address of the attacker's device to match an allowed MAC address on the network. By doing so, the penetration tester can trick the NAC system into granting unauthorized access.

Topics

#MAC spoofing#NAC bypass#Network access control#Unauthorized access

Community Discussion

No community discussion yet for this question.

Full PT0-002 PracticeBrowse All PT0-002 Questions